Technology providers on protecting against unexpected vulnerabilities

Q: What can higher ed institutions do to best protect themselves from technical vulnerabilities that most people would not expect are vulnerabilities (for example, wireless printers)?

“The most important thing organizations can do is ensure they have visibility into every layer of their IT environment—from the network perimeter all the way down to the endpoints. The more an IT team knows about what is connected to the network, the more effectively they can secure it.”

“Sixty percent of breaches are a result of stolen credentials, most often as a result phishing attacks. Many of these attacks are launched through social media. Not knowing who you are connecting with, or whether someone you know has unwittingly accepted a malicious link they are sharing with you is dangerous.”

More content like this

Register now for UBTech 2018

Register now for UBTech 2018, June 4-6 at the Mirage, Las Vegas. At UBTech 2018, you’ll network with a dynamic community of higher ed leaders who are shaping the future of campus technology and explore topics like cyber security, distance learning, campus learning space design, communications, personalized learning and more. Your UBTech registration also includes a free pass to the InfoComm exhibit hall.